2012 European Intelligence and Security Informatics Conference 2012
DOI: 10.1109/eisic.2012.58
|View full text |Cite
|
Sign up to set email alerts
|

Developing a Keystroke Biometric System for Continual Authentication of Computer Users

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(12 citation statements)
references
References 19 publications
0
7
0
Order By: Relevance
“…Early work in the field used keystroke dynamics [29], [18], [45], [19] to authenticate desktop users. Later studies on desktop users demonstrated the feasibility of using a variety of behavioral traits, including mouse dynamics [54], softbiometrics [47], hand movement [50], keyboard acoustics [51], screen fingerprints [21], language use [61], [49] and cognition during text production [39], [43], [60], [44]. Early studies in continuous authentication of mobile phone users focused on keystroke dynamics (see [14], [13], [9], [41], [10]), because these devices had a hardware keyboard to interface with the user.…”
Section: Evolution Of Continuous Authentication In Desktops Andmentioning
confidence: 99%
See 1 more Smart Citation
“…Early work in the field used keystroke dynamics [29], [18], [45], [19] to authenticate desktop users. Later studies on desktop users demonstrated the feasibility of using a variety of behavioral traits, including mouse dynamics [54], softbiometrics [47], hand movement [50], keyboard acoustics [51], screen fingerprints [21], language use [61], [49] and cognition during text production [39], [43], [60], [44]. Early studies in continuous authentication of mobile phone users focused on keystroke dynamics (see [14], [13], [9], [41], [10]), because these devices had a hardware keyboard to interface with the user.…”
Section: Evolution Of Continuous Authentication In Desktops Andmentioning
confidence: 99%
“…Early work in the field used keystroke dynamics [29], [18], [45], [19] to authenticate desktop users. Later studies on desktop users demonstrated the feasibility of using a variety of behavioral traits, including mouse dynamics [54], softbiometrics [47], hand movement [50], keyboard acoustics [51], screen fingerprints [21], language use [61], [49] and cognition during text production [39], [43], [60], [44].…”
Section: Evolution Of Continuous Authentication In Desktops Andmentioning
confidence: 99%
“…The open Villani keystroke dataset (Tappert et al, 2009;Monaco, Bakelman, Cha, & Tappert, 2012) is a keystroke dataset collected in an experimental setting. In the experiment, students and faculty could choose to conduct a copy task and/or an email writing task.…”
Section: Villani Datasetmentioning
confidence: 99%
“…This means that, for example, a system where the user must present his or her fingerprint on a scanner, or a system where he or she needs to speak specific words, is not a good system, because these interfere with the normal daily routine. In most cases, when a CA system is applied to a computer, mouse dynamics [2][3][4][5] and/or keystroke dynamics (KDs) [1, [6][7][8][9][10] have been used, although it is very well possible to include face recognition in case a webcam is available. For simplicity sake , in this paper, we will often assume that the CA system is based on KDs to help explain the ideas more concretely.…”
Section: Introductionmentioning
confidence: 99%